Rahul Nirmal 06/20/2010.  Search Engines  Facebook   Microsoft Office  Computer Security  Hardware/Software Maintenance.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Services Course Windows Live SkyDrive Participant Guide.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Collaboration Applications ADE100- Computer Literacy Lecture 28.
Internet & Day 2. Web Address/ URL 1.Uniform Resource Locator or web address use to access the web site 2.When you connected to the internet you.
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
Goodbye Snail Mail, Hello
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Starter for 10 Unit 7: Using Messenger Transform IT SFT07_messenger.
Moving to Win 7 Considerations Dean Steichen A2CAT 2010.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
March 14, Microsoft Microsoft officially announced the date and time that Internet Explorer 9 (IE9) will move away from a release candidate and.
For CCRI Students.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
JMU Outlook, Messenger, and Skydrive An easier way to upload and store files to share.
Communication Through Internet ADE100- Computer Literacy Lecture 25.
Module 6 Using the Internet for Working & Learning.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Cloud Computing. What is Cloud Computing? What is Cloud Computing? The cloud is an umbrella term for products and services that rely on the internet to.
Cloud Computing. Overview of Technology Accessible Anywhere Anytime.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Protecting and Sharing Documents Lesson 13. Objectives.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTORY MICROSOFT OUTLOOK Lesson 1 – Outlook Basics and .
Introduction: SIMULATION AND ANIMATION DESIGN. What is Simulation and Animation Design? Also known as Video Game Design or Graphic Design Contains: Ethics.
1. What is desktop publishing software used for? 2.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Internet Security and Your Computer Welcome to Boot Camp.
XP Browser and Basics COM111 Introduction to Computer Applications.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
SOFTWARE Module SOFTWARE Module Content (1) Choosing the right software The purpose of the software Web-based applications versus installed.
(Electronic Mail) a message sent and received electronically via telecommunication links between computers.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
Google Apps for Education Account Overview for Staff.
System Optimizer Software :. Intruduction : SystHeal Pro v2.2 is System Optimizer Software that can be use to prevent harmful viruses which may become.
Introduction : This Spyware remover software that keep all time your computer completely clean.Spyware remover software This software can secure your.
Working On-Line Module 4 People's Resource Center Barry Glicklich Last updated 27 March 2012Working On-Line (BG)1.
Latest Issues Related To The AVG Antivirus 2017
What is GroupWise? A tool for communication in our organization A system to send and receive A way to increase productivity A method to get documents.
How Microsoft Office 2010 Works with Cloud Computing and Social Media
Microsoft Office 2010 Basics and the Internet
Microsoft Office 2010 Basics and the Internet
Personal spaces.
Computing Fundamentals
Get your thinking cap on!
How to Create Message Template in Hotmail?
Steps to Setup and Install McAfee Antivirus
Microsoft Office 2003 Illustrated Introductory, Premium Edition
Attach In Gmail very Easily
Huntington Beach Public Library
Collaboration with Google Docs
Technology ICT Option: .
European Computer Driving Licence
Software Introduction
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Application Software EIT, © Author Gay Robertson, 2016.
9 ways to avoid viruses and spyware
ICT Communications Lesson 5: Communicating Using
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Technology ICT Option: .
Presentation transcript:

Rahul Nirmal 06/20/2010

 Search Engines  Facebook   Microsoft Office  Computer Security  Hardware/Software Maintenance

 Most popular search engine in the world.  So popular that many people say to find information, just “google it”.

 Most popular social networking website in the world.  Connects friends, family and others from all over the world.

 Stands for Electronic Mail.  Most popular communication method in the world.  Instantaneous and allows features like attaching photos and other files.

 Most popular providers are Gmail, Windows Live Mail (formerly Hotmail) and Yahoo Mail.

 Recommend to use web-based providers mentioned above, e.g. not  Do not use programs like Outlook or from universities, etc.  You can access web-based anywhere in the world and it is permanent, unlike university for example.

 “To:” sends the to contacts directly.  “CC” sends the to contacts indirectly.  “BCC” sends the to contacts and the other contacts cannot see to whom you sent it to.

 Create Google Account to use.  Works with all Google services, including YouTube.  Visit

 Create Yahoo Account to use.  Works with all Yahoo services, including Yahoo Messenger, Answers, etc.  Visit

 Create Windows Live Account to use.  Works with all Windows Live services, including Messenger, Office Live, etc.  Visit

 Most popular productivity software in the world.  Most popular versions Office 2003 and Office 2010 has just been released.  I will discuss Word and Excel today.

 Office 2007 is different that it uses the “ribbon” interface.

 Office 2007 documents put an ‘x’ after the filetype, they use a newer filetype. Eg. Word 2003 uses.doc, Word 2007 uses.docx.  It is recommended to save in format to preserve compatibility.  Older versions can still view the new files with a small download from Microsoft.

Text Formatting Text Proofreading

 Spreadsheet program used for calculating and graphing.

Using formulas Entering data

Sorting data Filtering data

Chart options Turn data into a chart

 When criminals take sensitive information in disguise.  Happens mostly through .  Example of “social engineering”

 Never click on links in to go to sensitive websites like bank accounts.  Check the URL in your web browser before typing in anything.

 Software designed to harm your computer.  Also occurs mostly through .  Most popular examples are spyware and viruses.

 Windows Defender  Included in Windows Vista and 7. Free download for XP.

 Use surge protector/UPS for protection.  Use compressed air for cleaning of dust from tight spaces and fans.  Use cloth with liquid spray or water to clean monitors.

 Keep Windows updated with “Windows Update”.  Keep updating anti-virus and security software.  Defragment hard drive to speed up performance.